<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE article
  PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.1 20151215//EN" "https://jats.nlm.nih.gov/publishing/1.1/JATS-journalpublishing1.dtd">
<article article-type="research-article" dtd-version="1.1" specific-use="sps-1.8" xml:lang="en" xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">
	<front>
		<journal-meta>
			<journal-id journal-id-type="publisher-id">dyna</journal-id>
			<journal-title-group>
				<journal-title>DYNA</journal-title>
				<abbrev-journal-title abbrev-type="publisher">Dyna rev.fac.nac.minas</abbrev-journal-title>
			</journal-title-group>
			<issn pub-type="ppub">0012-7353</issn>
			<issn pub-type="epub">2346-2183</issn>
			<publisher>
				<publisher-name>Universidad Nacional de Colombia</publisher-name>
			</publisher>
		</journal-meta>
		<article-meta>
			<article-id pub-id-type="doi">10.15446/dyna.v87n213.81859</article-id>
			<article-categories>
				<subj-group subj-group-type="heading">
					<subject>Artículos</subject>
				</subj-group>
			</article-categories>
			<title-group>
				<article-title>Composite cellular automata based encryption method applied to surveillance videos</article-title>
				<trans-title-group xml:lang="es">
					<trans-title>Método de encriptación basado en autómatas celulares compuestos aplicado a videos de vigilancia</trans-title>
				</trans-title-group>
			</title-group>
			<contrib-group>
				<contrib contrib-type="author">
					<name>
						<surname>Cortés-Martinez,</surname>
						<given-names>Luis Miguel</given-names>
					</name>
					<xref ref-type="aff" rid="aff1">a</xref>
				</contrib>
				<contrib contrib-type="author">
					<name>
						<surname>Alvarado-Nieto</surname>
						<given-names>Luz Deicy</given-names>
					</name>
					<xref ref-type="aff" rid="aff1">a</xref>
				</contrib>
				<contrib contrib-type="author">
					<name>
						<surname>Amaya-Barrera</surname>
						<given-names>Isabel</given-names>
					</name>
					<xref ref-type="aff" rid="aff1">a</xref>
				</contrib>
				<aff id="aff1">
					<label>a</label>
					<institution content-type="original"> Facultad de Ingeniería, Universidad Distrital Francisco José de Caldas, Bogotá, Colombia. lmcortesm@correo.udistrital.edu.co, lalvarado@udistrital.edu.co, iamaya@udistrital.edu.co </institution>
					<institution content-type="normalized">Universidad Distrital Francisco José de Caldas</institution>
					<institution content-type="orgdiv1">Facultad de Ingeniería</institution>
					<institution content-type="orgname">Universidad Distrital Francisco José de Caldas</institution>
					<addr-line>
						<city>Bogotá</city>
					</addr-line>
					<country country="CO">Colombia</country>
					<email>lmcortesm@correo.udistrital.edu.co</email>
					<email>lalvarado@udistrital.edu.co</email>
					<email>iamaya@udistrital.edu.co</email>
				</aff>
			</contrib-group>
			<pub-date pub-type="collection">
				<season>Apr-Jun</season>
				<year>2020</year>
			</pub-date>
			<volume>87</volume>
			<issue>213</issue>
			<fpage>212</fpage>
			<lpage>221</lpage>
			<history>
				<date date-type="received">
					<day>23</day>
					<month>08</month>
					<year>2019</year>
				</date>
				<date date-type="rev-recd">
					<day>17</day>
					<month>03</month>
					<year>2020</year>
				</date>
				<date date-type="accepted">
					<day>15</day>
					<month>04</month>
					<year>2020</year>
				</date>
			</history>
			<permissions>
				<license license-type="open-access" xlink:href="https://creativecommons.org/licenses/by-nc-nd/4.0" xml:lang="en">
					<license-p>The author; licensee Universidad Nacional de Colombia</license-p>
				</license>
			</permissions>
			<abstract>
				<title>Abstract</title>
				<p>This work is part of the research project “Encryption Models Based on Chaotic Attractors” institutionalized in the Research and Scientific Development Center of the Universidad Distrital Francisco José de Caldas. In this paper, a symmetric encryption method for surveillance videos is presented, based on reversible composite cellular automata developed for this purpose. This method takes advantage of reversible cellular automata and elementary rule 30 properties, for efficient regions of interest encryption in surveillance video frames, obtaining an algorithm which experimental results of security and performance are consistent with those reported in current literature. In addition, it allows decryption without loss of information through a fixed size key for each video frame.</p>
			</abstract>
			<trans-abstract xml:lang="es">
				<title>Resumen</title>
				<p>Este trabajo se enmarca en el proyecto de investigación “Modelos de Encriptación Basados En Atractores Caóticos” institucionalizado en el Centro de Investigaciones y Desarrollo Científico de la Universidad Distrital Francisco José de Caldas. En este documento, se presenta un método de encriptación simétrico para videos de vigilancia a partir de autómatas celulares compuestos reversibles desarrollados para este propósito. Este método aprovecha las propiedades de los autómatas celulares reversibles y de la regla elemental 30, para el cifrado eficiente de regiones de interés en fotogramas de videos de vigilancia, obteniendo un algoritmo cuyos resultados experimentales de seguridad y desempeño son consistentes de acuerdo con los reportados en la literatura actual. Además, permite el descifrado sin pérdida de información mediante una llave de tamaño fijo por cada fotograma de video.</p>
			</trans-abstract>
			<kwd-group xml:lang="en">
				<title>Keywords:</title>
				<kwd>cryptosystem</kwd>
				<kwd>reversible composite cellular automata</kwd>
				<kwd>video encryption</kwd>
				<kwd>region of interest encryption</kwd>
			</kwd-group>
			<kwd-group xml:lang="es">
				<title>Palabras clave:</title>
				<kwd>criptosistema</kwd>
				<kwd>autómatas celulares compuestos reversibles</kwd>
				<kwd>cifrado de videos</kwd>
				<kwd>cifrado de regiones de interés</kwd>
			</kwd-group>
			<counts>
				<fig-count count="14"/>
				<table-count count="6"/>
				<equation-count count="19"/>
				<ref-count count="36"/>
				<page-count count="10"/>
			</counts>
		</article-meta>
	</front>
	<body>
		<sec sec-type="intro">
			<title>1. Introduction</title>
			<p>Technological and communication advances, together with the social need for protection and intruder detection, have triggered the massive installation of video surveillance systems in recent years. Due to the large amount of information that is currently captured, stored and transmitted in image, audio and video formats, new cryptography techniques have been presented, and they have received the attention from a scientific and academic community with a view to generating more sophisticated, secure and faster proposals for these format types, since traditional cryptography methods are not effective for this purpose [<xref ref-type="bibr" rid="B1">1</xref>,<xref ref-type="bibr" rid="B2">2</xref>].</p>
			<p>Cryptography schemes that have arisen for image, audio and video formats take advantage of several theories such as elliptic curves [<xref ref-type="bibr" rid="B3">3</xref>], DNA sequences [<xref ref-type="bibr" rid="B4">4</xref>], quantum computing [<xref ref-type="bibr" rid="B5">5</xref>,<xref ref-type="bibr" rid="B6">6</xref>], discrete transforms [<xref ref-type="bibr" rid="B7">7</xref>,<xref ref-type="bibr" rid="B8">8</xref>], chaos theory [<xref ref-type="bibr" rid="B1">1</xref>,<xref ref-type="bibr" rid="B8">8</xref>-<xref ref-type="bibr" rid="B12">12</xref>] and cellular automata [<xref ref-type="bibr" rid="B6">6</xref>,<xref ref-type="bibr" rid="B11">11</xref>-<xref ref-type="bibr" rid="B18">18</xref>].</p>
			<p>Connection between cryptography and nonlinear dynamic systems theory has given rise to a line of research called chaotic cryptography, which approaches have been on the rise in recent years [<xref ref-type="bibr" rid="B10">10</xref>]. These approaches take advantage of intrinsic properties of continuous and discrete chaotic dynamic systems, that provide inherent strengths in information masking and have proven to be a security alternative for image, audio and video encryption. Nevertheless, reported disadvantages of chaotic cryptography in literature refer to the high computational cost and the required numerical precision of those algorithms to ensure high sensitivity [<xref ref-type="bibr" rid="B19">19</xref>].</p>
			<p>Cellular Automata (CAs) were introduced in the late 1940’s by von Neumann [<xref ref-type="bibr" rid="B20">20</xref>], as a mathematical model with a set of transformation rules that operate on a rectangular mesh formed of a finite number of cells, that interact and evolve in discrete time steps according to a local transition rule and may exhibit complex behaviors. In the last years, CAs have been used in several biological contexts [<xref ref-type="bibr" rid="B21">21</xref>,<xref ref-type="bibr" rid="B22">22</xref>]. Currently, CAs are an interest technique in the designing of image encryption methods, since it is possible to interpret and treat an image as the initial state of a Layered Cellular Automaton (LCA) and define encryption mechanisms based on its evolution [<xref ref-type="bibr" rid="B13">13</xref>,<xref ref-type="bibr" rid="B14">14</xref>]. Efficient and robust methods use CAs for image [<xref ref-type="bibr" rid="B14">14</xref>-<xref ref-type="bibr" rid="B17">17</xref>], audio [<xref ref-type="bibr" rid="B18">18</xref>] and video encryption [<xref ref-type="bibr" rid="B13">13</xref>]. Several cryptosystems merge CAs with other several approaches such as chaos theory [<xref ref-type="bibr" rid="B11">11</xref>,<xref ref-type="bibr" rid="B12">12</xref>] and quantum computing [<xref ref-type="bibr" rid="B6">6</xref>].</p>
			<p>According to the amount of information that is encrypted, two categories of video encryption have emerged: In the first, the frames that constitute the video are fully encrypted [<xref ref-type="bibr" rid="B23">23</xref>]; and in the second, only the regions of interest (RoIs) are considered, defined as the frame segments that contain sensitive information [<xref ref-type="bibr" rid="B13">13</xref>]. The second category is more efficient since the size of sensitive information is reduced. In [<xref ref-type="bibr" rid="B24">24</xref>-<xref ref-type="bibr" rid="B27">27</xref>], different methods of detection and extraction of RoIs have been proposed, which consider movement, people's faces, text, among others, as a kind of sensitive information.</p>
			<p>In this paper, LCAs and chaos inherent properties are used for the construction of a surveillance video encryption method that uses Composite Cellular Automata (CCAs), one- dimensional CAs designed for this method, which rules are constructed with the reversible elementary rules defined by Wolfram [<xref ref-type="bibr" rid="B28">28</xref>]. The proposed encryption method is symmetric and applicable to grayscale and color videos. The sender uses fixed size keys for the encryption of rectangular RoIs defined by motion perceptions in video frames. Encrypted RoIs conserve their original size.</p>
			<p>On the other hand, the receiver uses the same keys to recover the original video from the encrypted RoIs and the video frames with hidden RoIs coming from the sender.</p>
			<p>This paper is organized as follows. In Section 2, theoretical bases of this work are described. In Section 3, the developed encryption method is described in detail. In Section 4, experimental tests and performance analysis of the implemented cryptosystem are performed. Finally, Section 5 lists the conclusions and contributions of this paper.</p>
		</sec>
		<sec>
			<title>2. Theoretical framework</title>
			<p>Theoretical principles that support the work presented in this paper relate properties of cryptographic systems to the characteristics of one-dimensional CAs, to contribute in the information security field with a proposal applied on surveillance videos.</p>
			<sec>
				<title>2.1. Cryptographic systems</title>
				<p>Cryptography arises from the need to ensure confidentiality, integrity and availability of information. Consequently, cryptographic systems are designed and implemented, with the aim of transforming meaningful information into unintelligible data through a hiding mechanism that uses secret cipher keys and allows exclusive access of authorized users to the original information by a decryption process. On the other hand, cryptanalysis seeks to detect vulnerabilities in cryptosystems in order to retrieve or supplant information [<xref ref-type="bibr" rid="B29">29</xref>].</p>
				<p>There are two types of cryptosystems: symmetric and asymmetric. In symmetric type, the same key is used at both ends of a communication channel, while in asymmetric type each user has a public and a private key [<xref ref-type="bibr" rid="B29">29</xref>]. Algorithms based on CAs or chaos that have been proposed for image and video encryption are usually of symmetric type.</p>
				<p>In this work, density of periodic points, topological transitivity, and sensitive dependence on initial conditions of the combination of CAs pseudo-random behavior among with additional operations of integer numbers are used to induce the confusion and diffusion properties that should be part of a cryptographic method [<xref ref-type="bibr" rid="B30">30</xref>-<xref ref-type="bibr" rid="B32">32</xref>].</p>
				<p>The confusion property seeks to ensure that the cryptosystem evolution in time is independent of the encrypted text and the cipher key, that is, that the relationship between text and password is sufficiently complex to guarantee security. On the other hand, the diffusion property seeks that small changes in the original text should generate completely different encrypted text [<xref ref-type="bibr" rid="B30">30</xref>].</p>
				<sec>
					<title>2.2. Cellular Automata</title>
					<p>Cellular Automata (CAs) are massively parallel homogeneous discrete dynamic systems [<xref ref-type="bibr" rid="B20">20</xref>] with the capability to exhibit complex behaviors. They are represented by an n-dimensional matrix with a finite number of cells, where each cell <italic>i</italic> has a state <italic>s</italic>
 <sub>
 <italic>i</italic>
</sub> from a set of possible states <italic>S</italic> and evolves, synchronously with the other cells of the matrix, in discrete time steps according to a local transition rule or evolution function. The updated state of each cell depends on the entries of this function, which are the previous states of a set called neighborhood, that is conformed of the cell itself and some adjacent [<xref ref-type="bibr" rid="B11">11</xref>,<xref ref-type="bibr" rid="B33">33</xref>].</p>
					<p>The number of possible evolution rules <italic>N</italic>
 <sub>
 <italic>R</italic> 
</sub> for a one-dimensional CA is calculated by using <xref ref-type="disp-formula" rid="e1">eq. (1)</xref>, where <italic>k</italic> is the cardinality of <italic>s</italic> , and <italic>n</italic> is the number of cells that compose its neighborhood [<xref ref-type="bibr" rid="B21">21</xref>].</p>
					<p>
						<disp-formula id="e1">
							<graphic xlink:href="2346-2183-dyna-87-213-212-e1.png"/>
						</disp-formula>
					</p>
					<p>Boundaries of CAs can be periodic, reflecting or fixed [<xref ref-type="bibr" rid="B22">22</xref>]. Periodic boundaries are used in the proposed method.</p>
					<p>Elementary Cellular Automata (ECAs) are one- dimensional, each cell in an ECA has three neighbors and the set of possible states is 𝑆 = {0,1}. According to <xref ref-type="disp-formula" rid="e1">eq. (1)</xref>, there are 2<sup>28</sup>=256 different transformation rules for ECAs, called elementary rules, that are identified by integer numbers in the interval from 0 to 255 [<xref ref-type="bibr" rid="B28">28</xref>]. The next state for a cell <italic>I</italic> in an ECA in function of a given elementary rule <italic>f</italic> is calculated by <xref ref-type="disp-formula" rid="e2">eq. (2)</xref>, which is defined in terms of neighboring cells.</p>
					<p>
						<disp-formula id="e2">
							<graphic xlink:href="2346-2183-dyna-87-213-212-e2.png"/>
						</disp-formula>
					</p>
					<p>
						<xref ref-type="fig" rid="f1">Fig. 1</xref> schematizes the evolution of an <italic>i</italic>
 <sub>
 <italic>th</italic>
</sub> cell in an ECA.</p>
					<p>
						<fig id="f1">
							<label>Figure 1</label>
							<caption>
								<title>Cell evolution in an ECA.</title>
							</caption>
							<graphic xlink:href="2346-2183-dyna-87-213-212-gf1.png"/>
							<attrib>Source: The Authors.</attrib>
						</fig>
					</p>
					<p>Wolfram [<xref ref-type="bibr" rid="B28">28</xref>,<xref ref-type="bibr" rid="B33">33</xref>] classified elementary rules into four types according to behavior of CAs in space-time diagrams: homogeneous stable (class I), periodic stable (class II), chaotic (class III) and complex (class IV). Rule 30 is classified as class III and has been used as a pseudo-random number generator [<xref ref-type="bibr" rid="B28">28</xref>]. Unpredictable behavior with rule 30 increases when the number of cells is large and odd [<xref ref-type="bibr" rid="B34">34</xref>], and when avoiding the use of ECA’s entire rows or columns.</p>
					<p>An ECA presents reversibility when it is possible to obtain information about its past states through the current state of its cells, that is, when the state of each cell depends on the previous state of a single cell in the neighborhood [<xref ref-type="bibr" rid="B33">33</xref>].</p>
					<p>Only six elementary rules achieve reversibility on an ECA [<xref ref-type="bibr" rid="B28">28</xref>,<xref ref-type="bibr" rid="B33">33</xref>], called reversible elementary rules and listed on <xref ref-type="table" rid="t1">Table 1</xref>. For convenience, in the proposed encryption method an alternative notation for these rules is used in this paper, with respect to the value that takes each cell in the ECA based on its only predecessor in the neighborhood.</p>
					<p>
						<table-wrap id="t1">
							<label>Table 1.Reversible</label>
							<caption>
								<title>elementary rules.</title>
							</caption>
							<graphic xlink:href="2346-2183-dyna-87-213-212-gt1.png"/>
							<table-wrap-foot>
								<fn id="TFN1">
									<p>Source: The Authors.</p>
								</fn>
							</table-wrap-foot>
						</table-wrap>
					</p>
					<p>These rules can also be classified into two types: Self-Reversible (SRR) and Non-Self-Reversible Rules (NSRR). SRR are those rules that are reversible with themselves; and NSRR are those that do not achieve this property. ECAs have four NSRR (15, 85, 170 and 240) noted as ‘A’, ‘C’, ‘A̅’ and ‘C̅’; and two SRR (51 and 204), noted as ‘B’ and ‘B̅’. </p>
					<p>Reversibility property of CAs is useful in cryptosystems design. In one dimension, this reversibility can be determined, although in the literature it has been shown that this property is undecidable for two or more dimensions [<xref ref-type="bibr" rid="B20">20</xref>].</p>
					<p>
						<xref ref-type="fig" rid="f2">Fig. 2</xref> shows the behavior of an ECA that evolves four times with rule 240 (‘A’), and four times with rule 170 (‘C’) to return to its initial state ‘11100000’.</p>
					<p>
						<fig id="f2">
							<label>Figure 2</label>
							<caption>
								<title>ECA evolution with rules 240 and 170.</title>
							</caption>
							<graphic xlink:href="2346-2183-dyna-87-213-212-gf2.png"/>
							<attrib>Source: The Authors.</attrib>
						</fig>
					</p>
					<p>In CAs context, it is possible to interpret an image <italic>I</italic> with size 𝑀×𝑁 as a Layered Cellular Automaton (LCA), since it is a matrix with values in the interval from 0 to 255 (black to white), reason why each value can be represented with a byte [<xref ref-type="bibr" rid="B13">13</xref>,<xref ref-type="bibr" rid="B14">14</xref>]. If <italic>I</italic> is a grayscale image, the LCA that represents is an 8-layer CA, that is, a matrix of 𝑀×𝑁×8 bits as shown in <xref ref-type="fig" rid="f3">Fig. 3</xref>. If <italic>I</italic> is a color image, it is possible to represent it by three adjoined 8-layer CAs that form a 24-layer CA.</p>
					<p>
						<fig id="f3">
							<label>Figure 3</label>
							<caption>
								<title>Interpretation of image as LCA.</title>
							</caption>
							<graphic xlink:href="2346-2183-dyna-87-213-212-gf3.png"/>
							<attrib>Source: The Authors.</attrib>
						</fig>
					</p>
					<p>In the proposed method, each row or column that constitutes any layer in the LCA is considered as the initial state of a one-dimensional CA. The maximum number of one-dimensional CAs that constitutes a LCA obtained from I is given by <xref ref-type="disp-formula" rid="e3">eq. (3)</xref>, where the function 𝑚ax(𝑀,𝑁) returns the maximum value between M and N, and the L value is 8 in grayscale images or 24 in color images.</p>
					<p>
						<disp-formula id="e3">
							<graphic xlink:href="2346-2183-dyna-87-213-212-e3.png"/>
						</disp-formula>
					</p>
				</sec>
			</sec>
		</sec>
		<sec sec-type="methods">
			<title>3. Proposed cryptographic method</title>
			<p>In the following subsections, the key generation technique, the RoI extraction mechanism and the structure of the proposed cryptographic method are described. The central axis of this method is a kind of reversible one- dimensional CA.</p>
			<sec>
				<title>3.1. Composite Cellular Automata definition</title>
				<p>The kind of CAs formulated in this paper are named Composite Cellular Automata (CCAs). They are one- dimensional and ECA-based, since their transition rules are a combination of elementary rules. They are called composite rules, with which new possible behaviors emerge that cannot be obtained independently through ECAs.</p>
				<p>Formally, a composite rule F is given by expression in <xref ref-type="disp-formula" rid="e4">eq. (4)</xref>, where f<sub>
 <italic>i</italic> 
</sub> is an elementary rule and r is the number of elementary rules that constitute F.</p>
				<p>
					<disp-formula id="e4">
						<graphic xlink:href="2346-2183-dyna-87-213-212-e4.png"/>
					</disp-formula>
				</p>
				<p>In turn, each f<sub>
 <italic>i</italic>
</sub> defines the state for a set of r cells in the CCA from 𝑖 to 𝑖+𝑟−1 through the expressions in <xref ref-type="disp-formula" rid="e5">eq. (5)</xref>. The number of bits that represent a composite rule is 8 x r because an elementary rule is identified by eight bits.</p>
				<p>
					<disp-formula id="e5">
						<graphic xlink:href="2346-2183-dyna-87-213-212-e5.png"/>
					</disp-formula>
				</p>
				<p>
					<xref ref-type="fig" rid="f4">Fig. 4</xref> shows a 6-cell periodic boundaries CCA that evolves with a composite rule with r = 2.</p>
				<p>
					<fig id="f4">
						<label>Figure 4</label>
						<caption>
							<title>CCA evolution with r=2.</title>
						</caption>
						<graphic xlink:href="2346-2183-dyna-87-213-212-gf4.png"/>
						<attrib>Source: The Authors.</attrib>
					</fig>
				</p>
				<p>Utilization of CCAs has several advantages: a greater number of rules, the possibility of establishing new reversible rules, and an efficiency that resembles ECAs homogeneity.</p>
			</sec>
			<sec>
				<title>3.2. Reversible composite rules classification</title>
				<p>A reversible CCA evolves with a composite reversible rule, that consists exclusively of elementary reversible rules. The number of cells of a CCA must be multiple of r to ensure that every f<sub>i</sub> on F is used the same number of times.</p>
				<p>For simplicity purposes, alternative notation presented in <xref ref-type="table" rid="t1">Table 1</xref> is used to identify any reversible composite rule as a string of r characters, each one has six possible values (‘A’, ‘A̅’, ‘B’, ‘B̅’, ‘C’, ‘C̅’). Nevertheless, not all possible combinations of these values identify a reversible composite rule. In the proposed method, the r value is equal to 8.</p>
				<p>In the CCAs environment, new NSRR arise, that involve displacement in the same direction, labeled as Composite Shift Rules (CSR), and formed exclusively of the elementary rules ‘A’ and ‘A̅’, or ‘C’ and ‘C̅’. <xref ref-type="fig" rid="f5">Fig. 5</xref> shows the behavior of a CCA with initial state ‘11100000’ that evolves four times with rule ‘AAAAAA̅AA’ and other four with rule ‘CCCCC̅CCC’ to return to its initial state.</p>
				<p>
					<fig id="f5">
						<label>Figure 5</label>
						<caption>
							<title>CCA evolution with CSR rules.</title>
						</caption>
						<graphic xlink:href="2346-2183-dyna-87-213-212-gf5.png"/>
						<attrib>Source: The Authors.</attrib>
					</fig>
				</p>
				<p>In addition, reversible rules with capability to change the order of bits of an initial state arise, labeled as Bit Position Change Rules (BPCR). <xref ref-type="fig" rid="f6">Fig. 6</xref> shows the behavior of a CCA with initial state ‘00101010’ that evolves four times with composite reversible rule ‘BCABCABB’. Note that this BPCR is also an SRR. Nevertheless, there exist NSRR type BPCRs, as in the case of rules ‘BC̅ABC̅ABB’ and ‘BCA̅BCA̅BB’.</p>
				<p>
					<fig id="f6">
						<label>Figure 6</label>
						<caption>
							<title>CCA evolution with BPCR rule.</title>
						</caption>
						<graphic xlink:href="2346-2183-dyna-87-213-212-gf6.png"/>
						<attrib>Source: The Authors.</attrib>
					</fig>
				</p>
				<p>Finally, Identity-Complement Rules (ICR) arise, they are composed exclusively of the elementary rules ‘B’ and ‘B̅’, and they are also SRR.</p>
				<p>In <xref ref-type="fig" rid="f7">Fig. 7</xref>, reversible composite rule classification performed in this work is shown.</p>
				<p>
					<fig id="f7">
						<label>Figure 7</label>
						<caption>
							<title>Reversible composite rule classification.</title>
						</caption>
						<graphic xlink:href="2346-2183-dyna-87-213-212-gf7.png"/>
						<attrib>Source: The Authors.</attrib>
					</fig>
				</p>
				<p>The number of composite reversible rules N<sub>
 <italic>CRR</italic>
</sub> for a given r value is calculated using <xref ref-type="disp-formula" rid="e6">eq. (6)</xref>-(<xref ref-type="disp-formula" rid="e9">9</xref>), where N<sub>
 <italic>BPCR</italic>
</sub> , N<sub>
 <italic>CSR</italic>
</sub> and N<sub>
 <italic>ICR</italic>
</sub> represent the number of BPCR, CSR and ICR type rules, respectively.</p>
				<p>
					<disp-formula id="e6">
						<graphic xlink:href="2346-2183-dyna-87-213-212-e6.png"/>
					</disp-formula>
				</p>
				<p>
					<disp-formula id="e7">
						<graphic xlink:href="2346-2183-dyna-87-213-212-e7.png"/>
					</disp-formula>
				</p>
				<p>
					<disp-formula id="e8">
						<graphic xlink:href="2346-2183-dyna-87-213-212-e8.png"/>
					</disp-formula>
				</p>
				<p>
					<disp-formula id="e9">
						<graphic xlink:href="2346-2183-dyna-87-213-212-e9.png"/>
					</disp-formula>
				</p>
				<p>Note that N<sub>
 <italic>CRR</italic>
</sub> grows considerably as the r value increases.</p>
			</sec>
			<sec>
				<title>3.3. Composite reversible rules for LCA encryption</title>
				<p>From possible composite reversible rules with r value equal to 8, sixteen pairs were selected with the purpose of establish a different 4-bit sequence identifier for each one, they are listed in <xref ref-type="table" rid="t2">Table 2</xref>. The first eight pairs are CSR, and the eight remaining pairs are BPCR. The rules on the first column (rule set 1) are used in encryption, and the remaining (rule set 2) in decryption, that is, in original information recovery.</p>
				<p>As a strategy for the selection of eight first pairs of rules (numbered from 0 to 7 in <xref ref-type="table" rid="t2">Table 2</xref>), entropy values of the 256 possible 8-bit strings, finding 70 different combinations with entropy value 1, that is, strings which have four zeros and four ones in any order. From this string set, a group of eight was selected with a Hamming distance equal to four or six [<xref ref-type="bibr" rid="B35">35</xref>]. With these strings, eight CSR were constructed, first four are composed of ‘A’ and ‘A̅’; and remaining four are composed of ‘C’ and ‘C̅’, being the number 1 replaced by ‘A’ or ‘C’ and the number 0 replaced by ‘A̅’ or ‘C̅’.</p>
				<p>
					<table-wrap id="t2">
						<label>Table 2</label>
						<caption>
							<title>Rule sets for encryption and decryption.</title>
						</caption>
						<graphic xlink:href="2346-2183-dyna-87-213-212-gt2.png"/>
						<table-wrap-foot>
							<fn id="TFN2">
								<p>Source: The Authors.</p>
							</fn>
						</table-wrap-foot>
					</table-wrap>
				</p>
				<p>Similarly, as a strategy for the selection of rest pairs of rules (numbered from 8 to 15 in <xref ref-type="table" rid="t2">Table 2</xref>), the set of 15 possible 8-bit strings with exactly two pairs of consecutive ones are considered because their entropy is also 1, and a group of eight with a Hamming distance equal to two, four or six was selected from this set. With these strings, eight BPCR were constructed, being each pair of ones replaced by the elementary rule pair ‘CA’, ‘C̅A’, ‘C̅A̅’ or ‘CA̅’, and each zero is replaced by ‘B’ or ‘B̅’.</p>
			</sec>
			<sec>
				<title>3.4. Regions of interest detection and extraction</title>
				<p>In the encryption process, the sender stores the original video with hidden RoIs, the isolated cipher RoIs and their location in the video frames. Thus, a receiver can recover the encrypted video completely through the stored data and the correct keys.</p>
				<p>The encryption method is tested with a straightforward mechanism for RoI detection, that consider perceptible motion patterns in video as RoIs. An initial frame is considered as background, and the next frames are compared with initial frame to determine the pixels with changed value. If a group of pixels with changed value is connected and has a size greater or equal than 256 pixels, it will be enclosed by a rectangle and considered as a RoI. If two RoIs are 16 pixels away or less, they are grouped into an only RoI. Finally, each RoI dimensions are rounded to the closest multiple of 8 in order to allow a correct encryption process. This process was implemented through a routine in Matlab, using Image Processing Toolbox and Image Acquisition Toolbox libraries.</p>
			</sec>
			<sec>
				<title>3.5. Key generation</title>
				<p>Starting with an LCA from a predetermined image (such as example in <xref ref-type="fig" rid="f3">Fig. 3</xref>) an initial sequence of 1027 consecutive bits is extracted to form a 1027 columns matrix along with the LCA bits from a RoI, repeating, if required, bits from initial sequence to fill all columns. Subsequently, XOR operation is performed with each column entries, obtaining a 1027-bit sequence that will be the key to encrypt every RoI in a frame.</p>
				<p>The first 1023 bits in the key are named P<sub>s0</sub>, and the remaining four bits in its decimal representation define the value N<sub>
 <italic>0</italic> 
</sub> that indicates the iteration number to evolve P<sub>s0</sub> with elementary rule 30.</p>
			</sec>
			<sec>
				<title>3.6. Cryptographic method steps</title>
				<p>The encryption proposal consists of eight steps that are applied on each video frame.</p>
				<p>Step 1: RoIs detection, extraction and replacement by black rectangles in the original frame for storage.</p>
				<p>Step 2: Transpose RoIs which height is greater than their width.</p>
				<p>Step 3: A RoI in the frame is selected for key generation as explained in Section 3.5. RoIs in different frames are encrypted with different keys.</p>
				<p>Step 4: Let S<sub>
 <italic>ECA</italic>
</sub> be an ECA initial state, and N the number of evolutions with elementary rule 30, the 1023-bit sequence ps is calculated by expression in <xref ref-type="disp-formula" rid="e10">eq. (10)</xref>, assigning to S<sub>
 <italic>ECA</italic>
</sub> and N the previously defined values of ps<sub>0</sub> and N<sub>
 <italic>0</italic> 
</sub> respectively.</p>
				<p>
					<disp-formula id="e10">
						<graphic xlink:href="2346-2183-dyna-87-213-212-e10.png"/>
					</disp-formula>
				</p>
				<p>Step 5: Bit in position 1024 from the key is appended to ps and read from right to left in 4-bit segments. Decimal representation of each segment is obtained adding one, avoiding the appearing of zeros, forming a list of 256 integer numbers in the interval from 1 to 16 called multiplier sequence ms.</p>
				<p>Step 6: Composite rule identifiers sequence R, expressed by <xref ref-type="disp-formula" rid="e11">eq. (11)</xref> is obtained from algorithm 1, assuming that ps and ms have periodic boundary conditions, where Ns, previously specified in <xref ref-type="disp-formula" rid="e3">eq. (3)</xref>, is the maximum number of CCAs in the LCA that is obtained with the RoI of the largest width or height in the frame, and R<sub>i</sub> is a 4-bit string associated to a composite rule in <xref ref-type="table" rid="t2">Table 2</xref>.</p>
				<p>
					<disp-formula id="e11">
						<graphic xlink:href="2346-2183-dyna-87-213-212-e11.png"/>
					</disp-formula>
				</p>
				<p>In this step, rule 30 (<xref ref-type="disp-formula" rid="e10">eq. 10</xref>) is used to evolve ps, that along with multiplication and modulo of integer numbers in ms contribute to guarantee key sensitivity. The values in ms are used in the algorithm 1 to define numbers for the ps evolution with elementary rule 30 and determine the js values that acts as a displacement number for ps. Note that the bits that constitute R are 4-bit sequences coming from a specific ps state.</p>
				<p>Step 7: Evolution of LCAs obtained from each RoI. Each row that constitutes the layers in the LCA is considered the initial state of an CCA which corresponding evolution rule is identified by R<sub>
 <italic>i</italic>
</sub> . For encryption, the bits that form each LCA are reordered in three different ways:</p>
				<p>
					<list list-type="alpha-lower">
						<list-item>
							<p>By rows for each layer.</p>
						</list-item>
						<list-item>
							<p>By layers for each column.</p>
						</list-item>
						<list-item>
							<p>By layers for each row.</p>
						</list-item>
					</list>
				</p>
				<p>One evolution is performed after each rearrangement, thus, every LCA evolves three times. For decryption, each LCA evolve before each rearrangement, which order is inverted.</p>
				<p>
					<fig id="ch1">
						<label>Source:</label>
						<caption>
							<title>The Authors.</title>
						</caption>
						<graphic xlink:href="2346-2183-dyna-87-213-212-gch1.png"/>
					</fig>
				</p>
				<p>Step 8: Obtain encrypted RoIs from evolved LCAs. Transpose the previously transposed RoIs in Step 2 to recover their initial dimensions.</p>
				<p>The sender stores the cipher RoIs, and the receiver decrypt them to completely recover each frame of video. Decryption uses the second rule set in <xref ref-type="table" rid="t2">Table 2</xref> to perform the same process except for steps 1 and 3, because the decryption key for original video recovery is the same encryption key.</p>
			</sec>
		</sec>
		<sec sec-type="results|discussion">
			<title>4. Performance evaluation, analysis and discussion of results</title>
			<p>To corroborate the effectiveness of the proposed encryption and decryption process, a series of test and performance measures based on the image encryption literature [<xref ref-type="bibr" rid="B1">1</xref>-<xref ref-type="bibr" rid="B17">17</xref>] were performed. Each test allows to deduce that the proposed method excels as a security alternative and it is applicable in real environments.</p>
			<sec>
				<title><italic>4.1. Experimental tests</italic></title>
				<p>In order to show that proposed method is functional, robust and effective, a surveillance video segment coming from a security camera in the Universidad Distrital Francisco José de Caldas from Bogotá was encrypted. <xref ref-type="fig" rid="f8">Fig. 8</xref> shows a video frame, RoIs extraction and hiding, encryption and recovery of original image results.</p>
				<p>
					<fig id="f8">
						<label>Figure 8</label>
						<caption>
							<title>Application of the proposed method in a surveillance video. (a) Original frame, (b) Frame with hidden RoIs, (c) Cipher RoIs, (d) Recovered frame through decryption process.</title>
						</caption>
						<graphic xlink:href="2346-2183-dyna-87-213-212-gf8.png"/>
						<attrib>Source: The Authors.</attrib>
					</fig>
				</p>
				<p>Executions of this algorithm were performed on a computer with 8GB RAM and processor Intel Core i3 in the Matlab 2018a platform. Encryption and decryption times in for different sizes of image are shown in <xref ref-type="table" rid="t3">Table 3</xref>.</p>
				<p>
					<table-wrap id="t3">
						<label>Table 3</label>
						<caption>
							<title>Encryption and decryption time in milliseconds for proposed method.</title>
						</caption>
						<graphic xlink:href="2346-2183-dyna-87-213-212-gt3.png"/>
						<table-wrap-foot>
							<fn id="TFN3">
								<p>Source: The Authors.</p>
							</fn>
						</table-wrap-foot>
					</table-wrap>
				</p>
				<p>Proposed algorithm depends on image dimensions, that is, the number of CCAs that evolve in Step 7 and their length. Therefore, its computational complexity is 𝑂(3×𝑀×𝑁). </p>
			</sec>
		</sec>
		<sec>
			<title>4.2. Key space analysis</title>
			<p>A cipher key in the proposed method is formed by 1027 bits. Thus, the key space size to encrypt a video frame or image is equal to 2<sup>1027</sup>, that is greater that other proposals with same purpose as [<xref ref-type="bibr" rid="B1">1</xref>,<xref ref-type="bibr" rid="B3">3</xref>,<xref ref-type="bibr" rid="B6">6</xref>,<xref ref-type="bibr" rid="B8">8</xref>-<xref ref-type="bibr" rid="B15">15</xref>], which guarantees resistance to brute force attacks. In addition, it grows proportionally with the number of frames in a video.</p>
			<p>The following subsections refer to four images that have been encrypted with the proposed method. Original and cipher images are shown in <xref ref-type="fig" rid="f9">Fig. 9</xref>.</p>
			<p>
				<fig id="f9">
					<label>Figure 9</label>
					<caption>
						<title>Original and encrypted images. (a) Black image with size 256 x 256, (b) Encrypted black image, (c) Cameraman with size 256 x 256, (d) Encrypted cameraman, (e) Grayscale Lena with size 512 x 512, (f) Encrypted grayscale Lena, (g) Color Lena with size 512 x 512, (h) Encrypted color Lena.</title>
					</caption>
					<graphic xlink:href="2346-2183-dyna-87-213-212-gf9.png"/>
					<attrib>Source: The Authors.</attrib>
				</fig>
			</p>
			<sec>
				<title>4.3. Histogram analysis</title>
				<p>In <xref ref-type="fig" rid="f10">Fig. 10</xref>, histograms of original and cipher images from <xref ref-type="fig" rid="f9">Fig. 9</xref> are presented, proving that frequency distribution of pixel values in cipher images is uniform as expected.</p>
				<p>
					<fig id="f10">
						<label>Figure 10</label>
						<caption>
							<title>Histogram of images from <xref ref-type="fig" rid="f9">Fig. 9</xref>. (a) Black image, (b) Encrypted black image, (c) Cameraman, (d) Encrypted cameraman, (e) Grayscale Lena, (f) Encrypted grayscale Lena, (g) Color Lena, (h) Encrypted color Lena.</title>
						</caption>
						<graphic xlink:href="2346-2183-dyna-87-213-212-gf10.png"/>
						<attrib>Source: The Authors.</attrib>
					</fig>
				</p>
			</sec>
			<sec>
				<title>4.4. Entropy analysis</title>
				<p>For a grayscale image I, the entropy H(I) measures the pixel distribution values, which optimal values for a cipher image tends to 8 [<xref ref-type="bibr" rid="B13">13</xref>, <xref ref-type="bibr" rid="B30">30</xref>]. It is defined by <xref ref-type="disp-formula" rid="e12">eq. (12)</xref>.</p>
				<p>
					<disp-formula id="e12">
						<graphic xlink:href="2346-2183-dyna-87-213-212-e12.png"/>
					</disp-formula>
				</p>
				<p>Where x<sub>i</sub> is the i<sub>
 <italic>th</italic>
</sub> gray value of I,p(x<sub>i</sub>) is the occurrence probability of x<sub>
 <italic>i</italic>
</sub> and L is the number of pixels that constitute the image. For color images, this conception is applied on each RGB channel. Entropy values of original and cipher images in <xref ref-type="fig" rid="f9">Fig. 9</xref> are listed in <xref ref-type="table" rid="t4">Table 4</xref>, proving that encrypted images by proposed method present high randomness. </p>
				<p>
					<table-wrap id="t4">
						<label>Table 4</label>
						<caption>
							<title>Entropy values for original and cipher images.</title>
						</caption>
						<graphic xlink:href="2346-2183-dyna-87-213-212-gt4.png"/>
						<table-wrap-foot>
							<fn id="TFN4">
								<p>Source: The Authors.</p>
							</fn>
						</table-wrap-foot>
					</table-wrap>
				</p>
				<p>Obtained entropy values for cipher images are comparable to the values obtained in [<xref ref-type="bibr" rid="B1">1</xref>, <xref ref-type="bibr" rid="B3">3</xref>, <xref ref-type="bibr" rid="B5">5</xref>-<xref ref-type="bibr" rid="B13">13</xref>, <xref ref-type="bibr" rid="B16">16</xref>, <xref ref-type="bibr" rid="B17">17</xref>]. In addition, entropy value of cameraman cipher image in [<xref ref-type="bibr" rid="B13">13</xref>] is 7.988, less than the obtained with this method.</p>
			</sec>
			<sec>
				<title>4.5. Differential attack analysis</title>
				<p>Let E<sub>1</sub> and E<sub>2</sub> denote two images which result of encrypt two almost identical images with one-pixel difference, the Number of Pixel Changed Rate (NPCR) is the number of pixels at the same location in E<sub>1</sub> and E<sub>2</sub> with different values, and it is defined by <xref ref-type="bibr" rid="B13">eq. (13)</xref>-(<xref ref-type="bibr" rid="B14">14</xref>).</p>
				<p>
					<disp-formula id="e13">
						<graphic xlink:href="2346-2183-dyna-87-213-212-e13.png"/>
					</disp-formula>
				</p>
				<p>
					<disp-formula id="e14">
						<graphic xlink:href="2346-2183-dyna-87-213-212-e14.png"/>
					</disp-formula>
				</p>
				<p>The Unified Averaged Change Intensity (UACI) is the average absolute value of the difference between each pair of pixels at the same location in E<sub>1</sub> and and E<sub>2</sub>, it is defined by <xref ref-type="disp-formula" rid="e15">eq. (15)</xref>.</p>
				<p>
					<disp-formula id="e15">
						<graphic xlink:href="2346-2183-dyna-87-213-212-e15.png"/>
					</disp-formula>
				</p>
				<p>For two random images, NPCR and UACI optimal values are nearly 99.6094% and nearly 33.4635%, respectively [<xref ref-type="bibr" rid="B36">36</xref>]. </p>
				<p>Let I<sub>1</sub> denote an image from <xref ref-type="fig" rid="f9">Fig. 9</xref>, I<sub>2</sub> equal to I<sub>1</sub> except for a modified pixel value. E<sub>1</sub> and E<sub>2</sub> are the images obtained by encrypt I<sub>1</sub> and I<sub>2</sub>,respectively. Minimum, maximum and average obtained values of NPCR and UACI in 10 executions are presented in <xref ref-type="table" rid="t5">Table 5</xref>, which are close to the optimal values, proving that the proposed method resists differential attacks.</p>
				<p>
					<table-wrap id="t5">
						<label>Table 5.NPCR</label>
						<caption>
							<title>and UACI values.</title>
						</caption>
						<graphic xlink:href="2346-2183-dyna-87-213-212-gt5.png"/>
						<table-wrap-foot>
							<fn id="TFN5">
								<p>Source: The Authors.</p>
							</fn>
						</table-wrap-foot>
					</table-wrap>
				</p>
			</sec>
			<sec>
				<title>4.6. Correlation of adjacent pixels</title>
				<p>The correlation coefficient for an image is a decimal value between -1 and 1 defined by <xref ref-type="disp-formula" rid="e16">eq. (16)</xref>-(<xref ref-type="disp-formula" rid="e19">19</xref>) and it is calculated from a random adjacent pixel sample in different directions. In plain images, the correlation coefficient is close to 1, and the expected value in cipher images is close to 0 [<xref ref-type="bibr" rid="B13">13</xref>].</p>
				<p>
					<disp-formula id="e16">
						<graphic xlink:href="2346-2183-dyna-87-213-212-e16.png"/>
					</disp-formula>
				</p>
				<p>
					<disp-formula id="e17">
						<graphic xlink:href="2346-2183-dyna-87-213-212-e17.png"/>
					</disp-formula>
				</p>
				<p>
					<disp-formula id="e18">
						<graphic xlink:href="2346-2183-dyna-87-213-212-e18.png"/>
					</disp-formula>
				</p>
				<p>
					<disp-formula id="e19">
						<graphic xlink:href="2346-2183-dyna-87-213-212-e19.png"/>
					</disp-formula>
				</p>
				<p>In order to measure the existent correlation between adjacent pixels in images from <xref ref-type="fig" rid="f9">Fig. 9</xref>(g) and <xref ref-type="fig" rid="f9">Fig. 9</xref>(h), a set of 1000 random pairs of pixels in horizontal, vertical and diagonal position were considered for each RGB channel. </p>
				<p>Obtained values are grouped in <xref ref-type="table" rid="t6">Table 6</xref>, showing an almost null correlation value in every channel of the cipher image.</p>
				<p>
					<table-wrap id="t6">
						<label>Table 6</label>
						<caption>
							<title>Correlation coefficients for each RGB channel in two images.</title>
						</caption>
						<graphic xlink:href="2346-2183-dyna-87-213-212-gt6.png"/>
						<table-wrap-foot>
							<fn id="TFN6">
								<p>Source: The Authors.</p>
							</fn>
						</table-wrap-foot>
					</table-wrap>
				</p>
				<p>
					<xref ref-type="fig" rid="f11">Fig. 11</xref> shows the horizontal, vertical and diagonal values of adjacent pixels in the green channel for the original and the cipher image.</p>
				<p>
					<fig id="f11">
						<label>Figure 11</label>
						<caption>
							<title>Correlation between horizontally, vertically and diagonally adjacent pixels in the green channel of the original color image Lena (a)-(c), and the cipher color image Lena (d)-(f).</title>
						</caption>
						<graphic xlink:href="2346-2183-dyna-87-213-212-gf11.png"/>
						<attrib>Source: The Authors.</attrib>
					</fig>
				</p>
			</sec>
			<sec>
				<title>4.7. Key sensitivity</title>
				<p>A feature of secure cryptosystems is key sensitivity, that means, a slight change in the cipher key must produce a completely different cipher result [<xref ref-type="bibr" rid="B30">30</xref>].</p>
				<p>In order to prove key sensitivity from the sender side, the image from <xref ref-type="fig" rid="f9">Fig. 9</xref>(c) was encrypted using two keys K<sub>1</sub> and K<sub>2</sub> with one-bit difference, obtaining the results shown in <xref ref-type="fig" rid="f12">Fig. 12</xref>. The UACI and NPCR values related to the images in <xref ref-type="fig" rid="f12">Fig. 12</xref> (b) and (c) are 99.61% and 33.42% respectively, that implies that these cipher images are completely different.</p>
				<p>
					<fig id="f12">
						<label>Figure 12</label>
						<caption>
							<title>Encryption of image with two similar keys. (a) Original image, (b) Encrypted image using K<sub>1</sub>, (c) Encrypted image using K<sub>2</sub>.</title>
						</caption>
						<graphic xlink:href="2346-2183-dyna-87-213-212-gf12.png"/>
						<attrib>Source: The Authors.</attrib>
					</fig>
				</p>
				<p>In order to prove key sensitivity from the receiver side, K<sub>1</sub> are K<sub>2</sub> are used to decrypt the image from <xref ref-type="fig" rid="f12">Fig. 12</xref>(b), obtaining the results shown in <xref ref-type="fig" rid="f13">Fig. 13</xref>.</p>
				<p>
					<fig id="f13">
						<label>Figure 13</label>
						<caption>
							<title>Decryption of a cipher image with two similar keys. (a) Cipher image, (b) Decrypted image using K<sub>1</sub>, (c) Decrypted image using K<sub>2</sub>.</title>
						</caption>
						<graphic xlink:href="2346-2183-dyna-87-213-212-gf13.png"/>
						<attrib>Source: The Authors.</attrib>
					</fig>
				</p>
				<p>Note that original image is completely recovered by using K<sub>1</sub>, but it is not possible to retrieve encrypted information by using K<sub>2</sub></p>
				<p>It is remarked that every sensitivity test shows similar results, independently of the position occupied by the difference bit between K<sub>
 <italic>1</italic>
</sub> and K<sub>
 <italic>2</italic>
</sub> . Therefore, this method presents key sensitivity.</p>
				<p>The results presented in this section expose that the proposed method resists brute force attacks, correlation attacks, differential attacks, chosen-plaintext attacks according to performance results in encryption of <xref ref-type="fig" rid="f9">Fig. 9</xref>(a), and known-plaintext attacks as an effect of the strategy in Section 3.3, which frustrates the possibility of obtain the rules in R without having the cipher key.</p>
				<p>Although there are few encryption works focused on surveillance videos using the guideline proposed in this work, it was possible to calculate a collection of performance measures reported independently in several references, highlighting that the obtained measures are comparable with those in [<xref ref-type="bibr" rid="B1">1</xref>,<xref ref-type="bibr" rid="B3">3</xref>,<xref ref-type="bibr" rid="B5">5</xref>-<xref ref-type="bibr" rid="B13">13</xref>,<xref ref-type="bibr" rid="B15">15</xref>-<xref ref-type="bibr" rid="B17">17</xref>]. That implies high security of the proposed method and makes this work a significant contribution in the fields of image and video encryption.</p>
			</sec>
		</sec>
		<sec sec-type="conclusions">
			<title>5. Conclusions and future work</title>
			<p>The implemented CCA-based encryption method presents quantitative and qualitative optimal performance values, demonstrating that is an effective security alternative. Nevertheless, the efficiency of this method is dependent on the size of the RoIs.</p>
			<p>The proposed method is extensible and modifiable since not only a high number of composite reversible rules can be applied to the cryptosystem, but also it is possible to increase or reduce key size because it is not dependent on the size of the RoIs.</p>
			<p>Rectangular shape of RoIs could be adjusted to irregular contours with the aim of increase encryption efficiency. In addition, it is possible to modify the RoIs detection and extraction mechanism to avoid equivocal motion perceptions such as shadows reflected by lighting.</p>
			<p>Combining the behavior of elementary rule 30 with the multiplication and modulo operations to random numbers in the developed algorithm increases randomness and sensitivity of results in the proposed method, that implies the impossibility of successful fraudulent attacks.</p>
		</sec>
	</body>
	<back>
		<ref-list>
			<title>References</title>
			<ref id="B1">
				<label>[1]</label>
				<mixed-citation>[1] Pan, H., Lei, Y. and Jian, C., Research on digital image encryption algorithm based on double logistic chaotic map. EURASIP Journal on Image and Video Processing, 2018(1), pp. 1-10, 2018. DOI: 10.1186/s13640-018-0386-3</mixed-citation>
				<element-citation publication-type="journal">
					<person-group person-group-type="author">
						<name>
							<surname>Pan</surname>
							<given-names>H.</given-names>
						</name>
						<name>
							<surname>Lei</surname>
							<given-names>Y.</given-names>
						</name>
						<name>
							<surname>Jian</surname>
							<given-names>C</given-names>
						</name>
					</person-group>
					<article-title>Research on digital image encryption algorithm based on double logistic chaotic map</article-title>
					<source>EURASIP Journal on Image and Video Processing</source>
					<year>2018</year>
					<issue>1</issue>
					<fpage>1</fpage>
					<lpage>10</lpage>
					<year>2018</year>
					<pub-id pub-id-type="doi">10.1186/s13640-018-0386-3</pub-id>
				</element-citation>
			</ref>
			<ref id="B2">
				<label>[2]</label>
				<mixed-citation>[2] Dongare, A.S., Alvi, A.S. and Tarbani, N.M., An efficient technique for image encryption and decryption for secured multimedia application. International Research Journal of Engineering and Technology (IRJET), 4(4), pp. 3186-3190, 2017.</mixed-citation>
				<element-citation publication-type="journal">
					<person-group person-group-type="author">
						<name>
							<surname>Dongare</surname>
							<given-names>A.S.</given-names>
						</name>
						<name>
							<surname>Alvi</surname>
							<given-names>A.S.</given-names>
						</name>
						<name>
							<surname>Tarbani</surname>
							<given-names>N.M</given-names>
						</name>
					</person-group>
					<article-title>An efficient technique for image encryption and decryption for secured multimedia application</article-title>
					<source>International Research Journal of Engineering and Technology (IRJET)</source>
					<volume>4</volume>
					<issue>4</issue>
					<fpage>3186</fpage>
					<lpage>3190</lpage>
					<year>2017</year>
				</element-citation>
			</ref>
			<ref id="B3">
				<label>[3]</label>
				<mixed-citation>[3] Zhang, X. and Wang, X., Digital image encryption algorithm based on elliptic curve public cryptosystem. IEEE Access, 6, pp. 70025-70034, 2018. DOI: 10.1109/ACCESS.2018.2879844</mixed-citation>
				<element-citation publication-type="journal">
					<person-group person-group-type="author">
						<name>
							<surname>Zhang</surname>
							<given-names>X.</given-names>
						</name>
						<name>
							<surname>Wang</surname>
							<given-names>X</given-names>
						</name>
					</person-group>
					<article-title>Digital image encryption algorithm based on elliptic curve public cryptosystem</article-title>
					<source>IEEE Access</source>
					<volume>6</volume>
					<fpage>70025</fpage>
					<lpage>70034</lpage>
					<year>2018</year>
					<pub-id pub-id-type="doi">10.1109/ACCESS.2018.2879844</pub-id>
				</element-citation>
			</ref>
			<ref id="B4">
				<label>[4]</label>
				<mixed-citation>[4] Chai, X., Fu, X., Gan, Z., Lu, Y. and Chen, Y., A color image cryptosystem based on dynamic DNA encryption and chaos. Signal Processing, 166, pp. 44-62, 2019. DOI: 10.1016/j.sigpro.2018.09.029</mixed-citation>
				<element-citation publication-type="journal">
					<person-group person-group-type="author">
						<name>
							<surname>Chai</surname>
							<given-names>X.</given-names>
						</name>
						<name>
							<surname>Fu</surname>
							<given-names>X.</given-names>
						</name>
						<name>
							<surname>Gan</surname>
							<given-names>Z.</given-names>
						</name>
						<name>
							<surname>Lu</surname>
							<given-names>Y.</given-names>
						</name>
						<name>
							<surname>Chen</surname>
							<given-names>Y</given-names>
						</name>
					</person-group>
					<article-title>A color image cryptosystem based on dynamic DNA encryption and chaos</article-title>
					<source>Signal Processing</source>
					<volume>166</volume>
					<fpage>44</fpage>
					<lpage>62</lpage>
					<year>2019</year>
					<pub-id pub-id-type="doi">10.1016/j.sigpro.2018.09.029</pub-id>
				</element-citation>
			</ref>
			<ref id="B5">
				<label>[5]</label>
				<mixed-citation>[5] Naseri, M., Abdolmaleky, M., Laref, A., Parandin, F., Celik, T., Farouk, A., Mahamadi, M. and Jalanian, H., A new cryptography algorithm for quantum images. Optik 155, pp. 44-62, 2019. DOI: 10.1016/j.ijleo.2016.09.123</mixed-citation>
				<element-citation publication-type="journal">
					<person-group person-group-type="author">
						<name>
							<surname>Naseri</surname>
							<given-names>M.</given-names>
						</name>
						<name>
							<surname>Abdolmaleky</surname>
							<given-names>M.</given-names>
						</name>
						<name>
							<surname>Laref</surname>
							<given-names>A.</given-names>
						</name>
						<name>
							<surname>Parandin</surname>
							<given-names>F.</given-names>
						</name>
						<name>
							<surname>Celik</surname>
							<given-names>T.</given-names>
						</name>
						<name>
							<surname>Farouk</surname>
							<given-names>A.</given-names>
						</name>
						<name>
							<surname>Mahamadi</surname>
							<given-names>M.</given-names>
						</name>
						<name>
							<surname>Jalanian</surname>
							<given-names>H</given-names>
						</name>
					</person-group>
					<article-title>A new cryptography algorithm for quantum images</article-title>
					<source>Optik</source>
					<volume>155</volume>
					<fpage>44</fpage>
					<lpage>62</lpage>
					<year>2019</year>
					<pub-id pub-id-type="doi">10.1016/j.ijleo.2016.09.123</pub-id>
				</element-citation>
			</ref>
			<ref id="B6">
				<label>[6]</label>
				<mixed-citation>[6] Yang, Y-G., Tian, J., Lei, H., Zhou, Y. and Shi, W., Novel quantum image encryption using one-dimensional quantum cellular automata. Information Sciences, 345, pp. 257-270, 2016. DOI: 10.1016/j.ins.2016.01.078</mixed-citation>
				<element-citation publication-type="journal">
					<person-group person-group-type="author">
						<name>
							<surname>Yang</surname>
							<given-names>Y-G.</given-names>
						</name>
						<name>
							<surname>Tian</surname>
							<given-names>J.</given-names>
						</name>
						<name>
							<surname>Lei</surname>
							<given-names>H.</given-names>
						</name>
						<name>
							<surname>Zhou</surname>
							<given-names>Y.</given-names>
						</name>
						<name>
							<surname>Shi</surname>
							<given-names>W</given-names>
						</name>
					</person-group>
					<article-title>Novel quantum image encryption using one-dimensional quantum cellular automata</article-title>
					<source>Information Sciences</source>
					<volume>345</volume>
					<fpage>257</fpage>
					<lpage>270</lpage>
					<year>2016</year>
					<pub-id pub-id-type="doi">10.1016/j.ins.2016.01.078</pub-id>
				</element-citation>
			</ref>
			<ref id="B7">
				<label>[7]</label>
				<mixed-citation>[7] Chen, B., Yu, M., Tian, Y., Li, L., Wang, D. and Sun, X., Multiple-parameter fractional quaternion Fourier transform and its application in colour image encryption. IET Image Process, 12(12), pp. 2238-2249, 2018. DOI: 10.1049/iet-ipr.2018.5440</mixed-citation>
				<element-citation publication-type="journal">
					<person-group person-group-type="author">
						<name>
							<surname>Chen</surname>
							<given-names>B.</given-names>
						</name>
						<name>
							<surname>Yu</surname>
							<given-names>M.</given-names>
						</name>
						<name>
							<surname>Tian</surname>
							<given-names>Y.</given-names>
						</name>
						<name>
							<surname>Li</surname>
							<given-names>L.</given-names>
						</name>
						<name>
							<surname>Wang</surname>
							<given-names>D.</given-names>
						</name>
						<name>
							<surname>Sun</surname>
							<given-names>X</given-names>
						</name>
					</person-group>
					<article-title>Multiple-parameter fractional quaternion Fourier transform and its application in colour image encryption</article-title>
					<source>IET Image Process</source>
					<volume>12</volume>
					<issue>12</issue>
					<fpage>2238</fpage>
					<lpage>2249</lpage>
					<year>2018</year>
					<pub-id pub-id-type="doi">10.1049/iet-ipr.2018.5440</pub-id>
				</element-citation>
			</ref>
			<ref id="B8">
				<label>[8]</label>
				<mixed-citation>[8] Sneha, P.S., Sankar, S. and Kumar, A.S., A chaotic colour image encryption scheme combining Walsh-Hadamard transform and Arnold-Tent maps. Journal of Ambient Intelligence and Humanized Computing (2019), pp 1-20, 2019. DOI: 10.1007/s12652-019-01385-0</mixed-citation>
				<element-citation publication-type="journal">
					<person-group person-group-type="author">
						<name>
							<surname>Sneha</surname>
							<given-names>P.S.</given-names>
						</name>
						<name>
							<surname>Sankar</surname>
							<given-names>S.</given-names>
						</name>
						<name>
							<surname>Kumar</surname>
							<given-names>A.S</given-names>
						</name>
					</person-group>
					<article-title>A chaotic colour image encryption scheme combining Walsh-Hadamard transform and Arnold-Tent maps</article-title>
					<source>Journal of Ambient Intelligence and Humanized Computing</source>
					<year>2019</year>
					<fpage>1</fpage>
					<lpage>20</lpage>
					<year>2019</year>
					<pub-id pub-id-type="doi">10.1007/s12652-019-01385-0</pub-id>
				</element-citation>
			</ref>
			<ref id="B9">
				<label>[9]</label>
				<mixed-citation>[9] Attaullah, A.J. and Shah, T., Cryptosystem techniques based on the improved Chebyshev map: an application in image encryption. Multimedia Tools and Applications (2019), pp. 1-20, 2019. DOI: 10.1007/s11042-019-07981-8</mixed-citation>
				<element-citation publication-type="journal">
					<person-group person-group-type="author">
						<name>
							<surname>Attaullah</surname>
							<given-names>A.J.</given-names>
						</name>
						<name>
							<surname>Shah</surname>
							<given-names>T</given-names>
						</name>
					</person-group>
					<article-title>Cryptosystem techniques based on the improved Chebyshev map: an application in image encryption</article-title>
					<source>Multimedia Tools and Applications</source>
					<year>2019</year>
					<fpage>1</fpage>
					<lpage>20</lpage>
					<year>2019</year>
					<pub-id pub-id-type="doi">10.1007/s11042-019-07981-8</pub-id>
				</element-citation>
			</ref>
			<ref id="B10">
				<label>[10]</label>
				<mixed-citation>[10] Wang, X., Zhu, X. and Zhang, Y., An image encryption algorithm based on Josephus traversing and mixed chaotic map. IEEE Access 6, pp. 23733-23746, 2018. DOI: 10.1109/ACCESS.2018.2805847</mixed-citation>
				<element-citation publication-type="journal">
					<person-group person-group-type="author">
						<name>
							<surname>Wang</surname>
							<given-names>X.</given-names>
						</name>
						<name>
							<surname>Zhu</surname>
							<given-names>X.</given-names>
						</name>
						<name>
							<surname>Zhang</surname>
							<given-names>Y</given-names>
						</name>
					</person-group>
					<article-title>An image encryption algorithm based on Josephus traversing and mixed chaotic map</article-title>
					<source>IEEE Access</source>
					<volume>6</volume>
					<fpage>23733</fpage>
					<lpage>23746</lpage>
					<year>2018</year>
					<pub-id pub-id-type="doi">10.1109/ACCESS.2018.2805847</pub-id>
				</element-citation>
			</ref>
			<ref id="B11">
				<label>[11]</label>
				<mixed-citation>[11] Bakhshandeh, A. and Eslami, Z., An authenticated image encryption scheme based on chaotic maps and memory cellular automata. Optics and Lasers in Engineering, 51(6), pp. 665-673, 2013. DOI: 10.1016/j.optlaseng.2013.01.001</mixed-citation>
				<element-citation publication-type="journal">
					<person-group person-group-type="author">
						<name>
							<surname>Bakhshandeh</surname>
							<given-names>A.</given-names>
						</name>
						<name>
							<surname>Eslami</surname>
							<given-names>Z</given-names>
						</name>
					</person-group>
					<article-title>An authenticated image encryption scheme based on chaotic maps and memory cellular automata</article-title>
					<source>Optics and Lasers in Engineering</source>
					<volume>51</volume>
					<issue>6</issue>
					<fpage>665</fpage>
					<lpage>673</lpage>
					<year>2013</year>
					<pub-id pub-id-type="doi">10.1016/j.optlaseng.2013.01.001</pub-id>
				</element-citation>
			</ref>
			<ref id="B12">
				<label>[12]</label>
				<mixed-citation>[12] Wang, X. and Luan, D., A novel image encryption algorithm using chaos and reversible cellular automata. Communications in Nonlinear Science and Numerical Simulation, 18(11), pp. 3075-3085, 2013. DOI: 10.1016/j.cnsns.2013.04.008</mixed-citation>
				<element-citation publication-type="journal">
					<person-group person-group-type="author">
						<name>
							<surname>Wang</surname>
							<given-names>X.</given-names>
						</name>
						<name>
							<surname>Luan</surname>
							<given-names>D</given-names>
						</name>
					</person-group>
					<article-title>A novel image encryption algorithm using chaos and reversible cellular automata</article-title>
					<source>Communications in Nonlinear Science and Numerical Simulation</source>
					<volume>18</volume>
					<issue>11</issue>
					<fpage>3075</fpage>
					<lpage>3085</lpage>
					<year>2013</year>
					<pub-id pub-id-type="doi">10.1016/j.cnsns.2013.04.008</pub-id>
				</element-citation>
			</ref>
			<ref id="B13">
				<label>[13]</label>
				<mixed-citation>[13] Zhang, X., Seo, S. and Wang, C., A lightweight encryption method for privacy protection in surveillance videos. IEEE Access, 6, pp. 18074-18087. DOI: 10.1109/ACCESS.2018.2820724</mixed-citation>
				<element-citation publication-type="journal">
					<person-group person-group-type="author">
						<name>
							<surname>Zhang</surname>
							<given-names>X.</given-names>
						</name>
						<name>
							<surname>Seo</surname>
							<given-names>S.</given-names>
						</name>
						<name>
							<surname>Wang</surname>
							<given-names>C</given-names>
						</name>
					</person-group>
					<article-title>A lightweight encryption method for privacy protection in surveillance videos</article-title>
					<source>IEEE Access</source>
					<volume>6</volume>
					<fpage>18074</fpage>
					<lpage>18087</lpage>
					<pub-id pub-id-type="doi">10.1109/ACCESS.2018.2820724</pub-id>
				</element-citation>
			</ref>
			<ref id="B14">
				<label>[14]</label>
				<mixed-citation>[14] Zhang, X., Zhang, H. and Xu, C., Reverse iterative image encryption scheme using 8-layer cellular automata. KSII Transactions on Internet and Information Systems, 10(7), pp. 3397-3413, 2016. DOI: 10.3837/tiis.2016.07.029</mixed-citation>
				<element-citation publication-type="journal">
					<person-group person-group-type="author">
						<name>
							<surname>Zhang</surname>
							<given-names>X.</given-names>
						</name>
						<name>
							<surname>Zhang</surname>
							<given-names>H.</given-names>
						</name>
						<name>
							<surname>Xu</surname>
							<given-names>C</given-names>
						</name>
					</person-group>
					<article-title>Reverse iterative image encryption scheme using 8-layer cellular automata</article-title>
					<source>KSII Transactions on Internet and Information Systems</source>
					<volume>10</volume>
					<issue>7</issue>
					<fpage>3397</fpage>
					<lpage>3413</lpage>
					<year>2016</year>
					<pub-id pub-id-type="doi">10.3837/tiis.2016.07.029</pub-id>
				</element-citation>
			</ref>
			<ref id="B15">
				<label>[15]</label>
				<mixed-citation>[15] Wang, Y., Zhao, Yi., Zhou, Q. and Lin, Z., Image encryption using partitioned cellular automata. Neurocomputing, 275, pp. 1318-1332, 2018. DOI: 10.1016/j.neucom.2017.09.068</mixed-citation>
				<element-citation publication-type="journal">
					<person-group person-group-type="author">
						<name>
							<surname>Wang</surname>
							<given-names>Y.</given-names>
						</name>
						<name>
							<surname>Zhao</surname>
							<given-names>Yi.</given-names>
						</name>
						<name>
							<surname>Zhou</surname>
							<given-names>Q.</given-names>
						</name>
						<name>
							<surname>Lin</surname>
							<given-names>Z</given-names>
						</name>
					</person-group>
					<article-title>Image encryption using partitioned cellular automata</article-title>
					<source>Neurocomputing</source>
					<volume>275</volume>
					<fpage>1318</fpage>
					<lpage>1332</lpage>
					<year>2018</year>
					<pub-id pub-id-type="doi">10.1016/j.neucom.2017.09.068</pub-id>
				</element-citation>
			</ref>
			<ref id="B16">
				<label>[16]</label>
				<mixed-citation>[16] Li, K., Sun, M., Li, L. and Chen J., Image encryption algorithms based on non-uniform second-order reversible cellular automata with balanced rules. In: Huang, D.S., Bevilacqua, V., Premaratne, P. and Gupta, P., eds. Intelligent computing theories and application, ICIC 2017, part of Lecture Notes in Computer Science. Springer, Cham, Liverpool, UK, 2017. pp. 445-455. DOI: 10.1007/978-3-319-63309-1_41</mixed-citation>
				<element-citation publication-type="book">
					<person-group person-group-type="author">
						<name>
							<surname>Li</surname>
							<given-names>K.</given-names>
						</name>
						<name>
							<surname>Sun</surname>
							<given-names>M.</given-names>
						</name>
						<name>
							<surname>Li</surname>
							<given-names>L.</given-names>
						</name>
						<name>
							<surname>Chen</surname>
							<given-names>J</given-names>
						</name>
					</person-group>
					<chapter-title>Image encryption algorithms based on non-uniform second-order reversible cellular automata with balanced rules</chapter-title>
					<person-group person-group-type="author">
						<name>
							<surname>Huang</surname>
							<given-names>D.S.</given-names>
						</name>
						<name>
							<surname>Bevilacqua</surname>
							<given-names>V.</given-names>
						</name>
						<name>
							<surname>Premaratne</surname>
							<given-names>P.</given-names>
						</name>
						<name>
							<surname>Gupta</surname>
							<given-names>P</given-names>
						</name>
					</person-group>
					<source>Intelligent computing theories and application, ICIC 2017, part of Lecture Notes in Computer Science</source>
					<publisher-loc>Springer, Cham, Liverpool</publisher-loc>
					<publisher-name>UK</publisher-name>
					<year>2017</year>
					<fpage>445</fpage>
					<lpage>455</lpage>
					<pub-id pub-id-type="doi">10.1007/978-3-319-63309-1_41</pub-id>
				</element-citation>
			</ref>
			<ref id="B17">
				<label>[17]</label>
				<mixed-citation>[17] Zhang, X., Wang, C., Zhong, S. and Yao, Q., Image encryption scheme based on balanced two-dimensional cellular automata. Mathematical Problems in Engineering (2013), pp. 1-10, 2013. DOI: 10.1155/2013/562768</mixed-citation>
				<element-citation publication-type="journal">
					<person-group person-group-type="author">
						<name>
							<surname>Zhang</surname>
							<given-names>X.</given-names>
						</name>
						<name>
							<surname>Wang</surname>
							<given-names>C.</given-names>
						</name>
						<name>
							<surname>Zhong</surname>
							<given-names>S.</given-names>
						</name>
						<name>
							<surname>Yao</surname>
							<given-names>Q</given-names>
						</name>
					</person-group>
					<article-title>Image encryption scheme based on balanced two-dimensional cellular automata</article-title>
					<source>Mathematical Problems in Engineering</source>
					<year>2013</year>
					<fpage>1</fpage>
					<lpage>10</lpage>
					<year>2013</year>
					<pub-id pub-id-type="doi">10.1155/2013/562768</pub-id>
				</element-citation>
			</ref>
			<ref id="B18">
				<label>[18]</label>
				<mixed-citation>[18] George, S.N., Augustine, N. and Pattathil, D.P., Audio security through compressive sampling and cellular automata. Multimedia Tools and Applications, 74(23), pp. 10393-10417, 2015. DOI: 10.1007/s11042-014-2172-2</mixed-citation>
				<element-citation publication-type="journal">
					<person-group person-group-type="author">
						<name>
							<surname>George</surname>
							<given-names>S.N.</given-names>
						</name>
						<name>
							<surname>Augustine</surname>
							<given-names>N.</given-names>
						</name>
						<name>
							<surname>Pattathil</surname>
							<given-names>D.P</given-names>
						</name>
					</person-group>
					<article-title>Audio security through compressive sampling and cellular automata</article-title>
					<source>Multimedia Tools and Applications</source>
					<volume>74</volume>
					<issue>23</issue>
					<fpage>10393</fpage>
					<lpage>10417</lpage>
					<year>2015</year>
					<pub-id pub-id-type="doi">10.1007/s11042-014-2172-2</pub-id>
				</element-citation>
			</ref>
			<ref id="B19">
				<label>[19]</label>
				<mixed-citation>[19] Orúe, A., Contribución al estudio del criptoanálisis y diseño de los criptosistemas caóticos, Tesis Dr., Escuela Técnica Superior de Ingenieros de Telecomunicación (ETSIT), Universidad Politécnica de Madrid (UPM), España, 2013, 260 P.</mixed-citation>
				<element-citation publication-type="thesis">
					<person-group person-group-type="author">
						<name>
							<surname>Orúe</surname>
							<given-names>A</given-names>
						</name>
					</person-group>
					<source>Contribución al estudio del criptoanálisis y diseño de los criptosistemas caóticos</source>
					<comment content-type="degree">Tesis Dr</comment>
					<publisher-name>Escuela Técnica Superior de Ingenieros de Telecomunicación (ETSIT), Universidad Politécnica de Madrid (UPM)</publisher-name>
					<publisher-loc>España</publisher-loc>
					<year>2013</year>
					<fpage>260</fpage>
					<lpage>260</lpage>
				</element-citation>
			</ref>
			<ref id="B20">
				<label>[20]</label>
				<mixed-citation>[20] Kari, J., Theory of cellular automata: a survey. Theoretical Computer Science, 334(1-3), pp. 3-33, 2005. DOI: 10.1016/j.tcs.2004.11.021</mixed-citation>
				<element-citation publication-type="journal">
					<person-group person-group-type="author">
						<name>
							<surname>Kari</surname>
							<given-names>J</given-names>
						</name>
					</person-group>
					<article-title>Theory of cellular automata: a survey</article-title>
					<source>Theoretical Computer Science</source>
					<volume>334</volume>
					<issue>1-3</issue>
					<fpage>3</fpage>
					<lpage>33</lpage>
					<year>2005</year>
					<pub-id pub-id-type="doi">10.1016/j.tcs.2004.11.021</pub-id>
				</element-citation>
			</ref>
			<ref id="B21">
				<label>[21]</label>
				<mixed-citation>[21] Bilotta, E. and Pantano, P., Cellular Automata and Complex Systems: Methods for Modeling Biological Phenomena. IGI Global, 2010.</mixed-citation>
				<element-citation publication-type="book">
					<person-group person-group-type="author">
						<name>
							<surname>Bilotta</surname>
							<given-names>E.</given-names>
						</name>
						<name>
							<surname>Pantano</surname>
							<given-names>P</given-names>
						</name>
					</person-group>
				</element-citation>
			</ref>
			<ref id="B22">
				<label>[22]</label>
				<mixed-citation>[22] Deutsch, A. and Dormann, S., Cellular Automaton Modeling of Biological Pattern Formation: Characterization, Applications and Analysis. Birkhäuser Boston, 2005.</mixed-citation>
				<element-citation publication-type="book">
					<person-group person-group-type="author">
						<name>
							<surname>Deutsch</surname>
							<given-names>A.</given-names>
						</name>
						<name>
							<surname>Dormann</surname>
							<given-names>S</given-names>
						</name>
					</person-group>
					<source>Cellular Automaton Modeling of Biological Pattern Formation: Characterization, Applications and Analysis</source>
					<publisher-name>Birkhäuser Boston</publisher-name>
					<year>2005</year>
				</element-citation>
			</ref>
			<ref id="B23">
				<label>[23]</label>
				<mixed-citation>[23] Auer S., Bliem A., Engel D., Uhl A. and Unterweger A., Bitstream-based JPEG encryption in real-time. International Journal of Digital Crime and Forensics, 5(3), pp. 1-14, 2013. DOI: 10.4018/jdcf.2013070101</mixed-citation>
				<element-citation publication-type="journal">
					<person-group person-group-type="author">
						<name>
							<surname>Auer</surname>
							<given-names>S.</given-names>
						</name>
						<name>
							<surname>Bliem</surname>
							<given-names>A.</given-names>
						</name>
						<name>
							<surname>Engel</surname>
							<given-names>D.</given-names>
						</name>
						<name>
							<surname>Uhl</surname>
							<given-names>A.</given-names>
						</name>
						<name>
							<surname>Unterweger</surname>
							<given-names>A</given-names>
						</name>
					</person-group>
					<article-title>Bitstream-based JPEG encryption in real-time</article-title>
					<source>International Journal of Digital Crime and Forensics</source>
					<volume>5</volume>
					<issue>3</issue>
					<fpage>1</fpage>
					<lpage>14</lpage>
					<year>2013</year>
					<pub-id pub-id-type="doi">10.4018/jdcf.2013070101</pub-id>
				</element-citation>
			</ref>
			<ref id="B24">
				<label>[24]</label>
				<mixed-citation>[24] Mateu, O., Análisis y detección de objetos de primer plano en secuencias de video, Proyecto final de carrera, Universitat Politècnica de Catalunya, Escola Tècnica Superior d'Enginyeria de Telecomunicació de Barcelona, 2009, 67 P. </mixed-citation>
				<element-citation publication-type="confproc">
					<person-group person-group-type="author">
						<name>
							<surname>Mateu</surname>
							<given-names>O</given-names>
						</name>
					</person-group>
					<source>Análisis y detección de objetos de primer plano en secuencias de video</source>
					<conf-name>Proyecto final de carrera, Universitat Politècnica de Catalunya</conf-name>
					<conf-sponsor>Escola Tècnica Superior d'Enginyeria de Telecomunicació de Barcelona</conf-sponsor>
					<year>2009</year>
					<fpage>67</fpage>
					<lpage>67</lpage>
				</element-citation>
			</ref>
			<ref id="B25">
				<label>[25]</label>
				<mixed-citation>[25] Negri, P. and Garayalde, D., Pedestrian tracking using probability fields and a movement feature space. DYNA 84(200), pp. 217-227, 2017. DOI: 10.15446/dyna.v84n200.57028</mixed-citation>
				<element-citation publication-type="journal">
					<person-group person-group-type="author">
						<name>
							<surname>Negri</surname>
							<given-names>P.</given-names>
						</name>
						<name>
							<surname>Garayalde</surname>
							<given-names>D</given-names>
						</name>
					</person-group>
					<article-title>Pedestrian tracking using probability fields and a movement feature space</article-title>
					<source>DYNA</source>
					<volume>84</volume>
					<issue>200</issue>
					<fpage>217</fpage>
					<lpage>227</lpage>
					<year>2017</year>
					<pub-id pub-id-type="doi">10.15446/dyna.v84n200.57028</pub-id>
				</element-citation>
			</ref>
			<ref id="B26">
				<label>[26]</label>
				<mixed-citation>[26] Sun, X., Wu, P. and Hoi, S., Face detection using deep learning: an improved faster RCNN approach. Neurocomputing, 299, pp. 42-50, 2018. DOI: 10.1016/j.neucom.2018.03.030</mixed-citation>
				<element-citation publication-type="journal">
					<person-group person-group-type="author">
						<name>
							<surname>Sun</surname>
							<given-names>X.</given-names>
						</name>
						<name>
							<surname>Wu</surname>
							<given-names>P.</given-names>
						</name>
						<name>
							<surname>Hoi</surname>
							<given-names>S</given-names>
						</name>
					</person-group>
					<article-title>Face detection using deep learning: an improved faster RCNN approach</article-title>
					<source>Neurocomputing</source>
					<volume>299</volume>
					<fpage>42</fpage>
					<lpage>50</lpage>
					<year>2018</year>
					<pub-id pub-id-type="doi">10.1016/j.neucom.2018.03.030</pub-id>
				</element-citation>
			</ref>
			<ref id="B27">
				<label>[27]</label>
				<mixed-citation>[27] Zhou, X., Yao, C., Wen, H., Wang, Y., Zhou, S., He, W. and Liang, J., EAST: an efficient and accurate scene text detector. Proceedings of 2017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR), Honolulu, HI, 2017, pp. 2642-2651. DOI: 10.1109/CVPR.2017.283.</mixed-citation>
				<element-citation publication-type="confproc">
					<person-group person-group-type="author">
						<name>
							<surname>Zhou</surname>
							<given-names>X.</given-names>
						</name>
						<name>
							<surname>Yao</surname>
							<given-names>C.</given-names>
						</name>
						<name>
							<surname>Wen</surname>
							<given-names>H.</given-names>
						</name>
						<name>
							<surname>Wang</surname>
							<given-names>Y.</given-names>
						</name>
						<name>
							<surname>Zhou</surname>
							<given-names>S.</given-names>
						</name>
						<name>
							<surname>He</surname>
							<given-names>W.</given-names>
						</name>
						<name>
							<surname>Liang</surname>
							<given-names>J</given-names>
						</name>
					</person-group>
					<source>EAST: an efficient and accurate scene text detector</source>
					<conf-name>Proceedings of 2017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR)</conf-name>
					<conf-loc>Honolulu</conf-loc>
					<year>2017</year>
					<fpage>2642</fpage>
					<lpage>2651</lpage>
					<pub-id pub-id-type="doi">10.1109/CVPR.2017.283</pub-id>
				</element-citation>
			</ref>
			<ref id="B28">
				<label>[28]</label>
				<mixed-citation>[28] Wolfram, S., A new kind of science. Wolfram Media, Champaign, IL, 2002 [accessed August 1st, 2019]. Available at: <comment>Available at: <ext-link ext-link-type="uri" xlink:href="https://www.wolframscience.com/nks">https://www.wolframscience.com/nks</ext-link>
					</comment>.</mixed-citation>
				<element-citation publication-type="book">
					<person-group person-group-type="author">
						<name>
							<surname>Wolfram</surname>
							<given-names>S</given-names>
						</name>
					</person-group>
					<source>A new kind of science. Wolfram Media</source>
					<publisher-loc>Champaign, IL</publisher-loc>
					<year>2002</year>
					<date-in-citation content-type="access-date" iso-8601-date="2019-00-00">August 1st, 2019</date-in-citation>
					<comment>Available at: <ext-link ext-link-type="uri" xlink:href="https://www.wolframscience.com/nks">https://www.wolframscience.com/nks</ext-link>
					</comment>
				</element-citation>
			</ref>
			<ref id="B29">
				<label>[29]</label>
				<mixed-citation>[29] Stallings, W., Cryptography and network security: principles and practice. 7th ed., Pearson Education, 2017.</mixed-citation>
				<element-citation publication-type="book">
					<person-group person-group-type="author">
						<name>
							<surname>Stallings</surname>
							<given-names>W</given-names>
						</name>
					</person-group>
					<source>Cryptography and network security: principles and practice</source>
					<edition>7</edition>
					<publisher-name>Pearson Education</publisher-name>
					<year>2017</year>
				</element-citation>
			</ref>
			<ref id="B30">
				<label>[30]</label>
				<mixed-citation>[30] Shannon, C., Communication theory of secrecy systems. Bell System Technical Journal, 28(4), pp. 656-715, 1949. DOI: 10.1002/j.1538-7305.1949.tb00928.x</mixed-citation>
				<element-citation publication-type="journal">
					<person-group person-group-type="author">
						<name>
							<surname>Shannon</surname>
							<given-names>C</given-names>
						</name>
					</person-group>
					<article-title>Communication theory of secrecy systems</article-title>
					<source>Bell System Technical Journal</source>
					<volume>28</volume>
					<issue>4</issue>
					<fpage>656</fpage>
					<lpage>715</lpage>
					<year>1949</year>
					<pub-id pub-id-type="doi">10.1002/j.1538-7305.1949.tb00928.x</pub-id>
				</element-citation>
			</ref>
			<ref id="B31">
				<label>[31]</label>
				<mixed-citation>[31] Devaney, R.L., An Introduction to Chaotic Dynamical Systems. 2nd ed., Addison-Wesley, 1989.</mixed-citation>
				<element-citation publication-type="book">
					<person-group person-group-type="author">
						<name>
							<surname>Devaney</surname>
							<given-names>R.L</given-names>
						</name>
					</person-group>
					<source>An Introduction to Chaotic Dynamical Systems</source>
					<edition>2nd </edition>
					<publisher-name>Addison-Wesley</publisher-name>
					<year>1989</year>
				</element-citation>
			</ref>
			<ref id="B32">
				<label>[32]</label>
				<mixed-citation>[32] Cattaneo, G., Formenti, E., Margara, L. and Mauri, G., On the dynamical behavior of chaotic cellular automata. Theoretical Computer Science, 217(1), pp. 31-51, 1999. DOI: 10.1016/S0304-3975(98)00149-2</mixed-citation>
				<element-citation publication-type="journal">
					<person-group person-group-type="author">
						<name>
							<surname>Cattaneo</surname>
							<given-names>G.</given-names>
						</name>
						<name>
							<surname>Formenti</surname>
							<given-names>E.</given-names>
						</name>
						<name>
							<surname>Margara</surname>
							<given-names>L.</given-names>
						</name>
						<name>
							<surname>Mauri</surname>
							<given-names>G</given-names>
						</name>
					</person-group>
					<article-title>On the dynamical behavior of chaotic cellular automata</article-title>
					<source>Theoretical Computer Science</source>
					<volume>217</volume>
					<issue>1</issue>
					<fpage>31</fpage>
					<lpage>51</lpage>
					<year>1999</year>
					<pub-id pub-id-type="doi">10.1016/S0304-3975(98)00149-2</pub-id>
				</element-citation>
			</ref>
			<ref id="B33">
				<label>[33]</label>
				<mixed-citation>[33] Coleman, I., Finite-width elementary cellular automata. Senior Project Archive, Whitman College, WA, 2011. </mixed-citation>
				<element-citation publication-type="book">
					<person-group person-group-type="author">
						<name>
							<surname>Coleman</surname>
							<given-names>I</given-names>
						</name>
					</person-group>
					<source>Finite-width elementary cellular automata. Senior Project Archive</source>
					<publisher-loc>Whitman College, WA</publisher-loc>
					<year>2011</year>
				</element-citation>
			</ref>
			<ref id="B34">
				<label>[34]</label>
				<mixed-citation>[34] Gage, D., Laub, E. and McGarry, B., Cellular automata: is rule 30 random?. Proceedings of the Midwest NKS Conference, Indiana University, 2005.</mixed-citation>
				<element-citation publication-type="confproc">
					<person-group person-group-type="author">
						<name>
							<surname>Gage</surname>
							<given-names>D.</given-names>
						</name>
						<name>
							<surname>Laub</surname>
							<given-names>E.</given-names>
						</name>
						<name>
							<surname>McGarry</surname>
							<given-names>B</given-names>
						</name>
					</person-group>
					<source>Cellular automata: is rule 30 random?</source>
					<conf-name>Proceedings of the Midwest NKS Conference</conf-name>
					<conf-sponsor>Indiana University</conf-sponsor>
					<year>2005</year>
				</element-citation>
			</ref>
			<ref id="B35">
				<label>[35]</label>
				<mixed-citation>[35] Hamming, R.W., Error detecting and error correcting codes. The Bell System Technical Journal, 29(2), 1950. DOI: 10.1002/j.1538-7305.1950.tb00463.x</mixed-citation>
				<element-citation publication-type="journal">
					<person-group person-group-type="author">
						<name>
							<surname>Hamming</surname>
							<given-names>R.W</given-names>
						</name>
					</person-group>
					<article-title>Error detecting and error correcting codes</article-title>
					<source>The Bell System Technical Journal</source>
					<volume>29</volume>
					<issue>2</issue>
					<year>1950</year>
					<pub-id pub-id-type="doi">10.1002/j.1538-7305.1950.tb00463.x</pub-id>
				</element-citation>
			</ref>
			<ref id="B36">
				<label>[36]</label>
				<mixed-citation>[36] Wu, Y., Noonan, J.P. and Agaian, S., NPCR and UACI randomness tests for image encryption. Multidisciplinary Journals in Science and Technology, Journal of Selected Areas in Telecommunications (JSAT), 1(2), pp. 31-38, 2011.</mixed-citation>
				<element-citation publication-type="journal">
					<person-group person-group-type="author">
						<name>
							<surname>Wu</surname>
							<given-names>Y.</given-names>
						</name>
						<name>
							<surname>Noonan</surname>
							<given-names>J.P.</given-names>
						</name>
						<name>
							<surname>Agaian</surname>
							<given-names>S</given-names>
						</name>
					</person-group>
					<article-title>NPCR and UACI randomness tests for image encryption. Multidisciplinary Journals in Science and Technology</article-title>
					<source>Journal of Selected Areas in Telecommunications (JSAT)</source>
					<volume>1</volume>
					<issue>2</issue>
					<fpage>31</fpage>
					<lpage>38</lpage>
					<year>2011</year>
				</element-citation>
			</ref>
		</ref-list>
		<fn-group>
			<fn fn-type="other" id="fn1">
				<label>L.M. Cortés-Martinez,</label>
				<p> received the BSc. Eng. in Systems Engineering from the Universidad Distrital Francisco José de Caldas, Colombia, in 2019. His research interests include cryptography, cellular automata, fuzzy logic and algorithmic composition of music. He is member of the Grupo de Complejidad de la Universidad Distrital (ComplexUD), Colombia. ORCID: 0000-0003-0606-3742</p>
			</fn>
			<fn fn-type="other" id="fn2">
				<label>L.D. Alvarado-Nieto,</label>
				<p> received the BSc. Eng in Systems Engineering from the Universidad Distrital Francisco José de Caldas, Colombia, in 1991, the MSc. in Systems Engineering in the Universidad Nacional de Colombia in 2003, and the PhD degree in Computer Science and Artificial Intelligence in the Universidad de Oviedo, Spain, in 2002. Currently, she is professor at the Engineering School of the Universidad Distrital Francisco José de Caldas, and Director of the Grupo de Complejidad de la Universidad Distrital (ComplexUD), Colombia.ORCID: 0000-0002-1305-3123</p>
			</fn>
			<fn fn-type="other" id="fn3">
				<label>E.I. Amaya-Barrera,</label>
				<p> received the BSc. in Mathematics in the Universidad Distrital Francisco José de Caldas in 1995, and the MSc. in Mathematics Sciences in the Universidad Nacional de Colombia in 1999. Currently, she is professor in the Engineering School of Universidad Distrital Francisco José de Caldas, Colombia. She is member of the Grupo de Complejidad de la Universidad Distrital (ComplexUD), .ORCID: 0000-0002-8845-5901</p>
			</fn>
			<fn fn-type="other" id="fn4">
				<label>How to cite:</label>
				<p> Cortés-Martinez, L.M, Alvarado-Nieto, L.D. and Amaya-Barrera, I, Composite cellular automata based encryption method applied to surveillance videos. DYNA, 87(213), pp. 212-221, April - June, 2020.</p>
			</fn>
		</fn-group>
	</back>
</article>